WikiLeaks dump brings CIA spying powers into the spotlight

Has the CIA ever spied on you? That’s a key question swirling around the WikiLeaks document dump that allegedly details the U.S. agency's secret hacking tools.

The documents themselves don't reveal much about who the CIA might have snooped on. But the agency certainly has the power to spy on foreigners outside the U.S., said Paul Pillar, a former deputy counterterrorism chief with the CIA.

That's its job after all: to collect foreign intelligence. But even so, the CIA is pretty selective with its targets.

The CIA's spying powers

Stopping terrorists and rival governments is the priority, Pillar said. And NSA-style mass surveillance doesn't necessarily help in that mission; it can actually "overload" the investigations with unnecessary data, he said.

"They've [the CIA] got far too much to do, and they're already inundated with too much information as is," he said.

So if you aren't involved in any plot against the U.S. or Western democracy, the CIA isn't going to waste its time on you, Pillar added.

However, it's important to note that U.S. citizens aren't immune to the CIA's spying powers. The agency can spy on them when they're outside the country, but only if it has the approval of the U.S. attorney general and a special court, when applicable.

Also, spying can be tricky. What happens if the CIA is listening in on a suspected terrorist who's speaking to a U.S. citizen?

Intelligence agencies will collect the raw data, but will usually redact any mention of the U.S. person from the finished intel report, Pillar said. In other cases, where the U.S. person is suspected of committing a serious crime, the data will be forwarded to a separate agency like the FBI, he said.

The number of "people who have access to the raw take … is extremely small,” Pillar said. "Any people who read that final report, they don’t get any information on the U.S. person at all."

A glimpse into the CIA’s playbook

Other security experts say there's nothing in the WikiLeaks document dump that shows the CIA engaged in mass surveillance.

Rather the documents allegedly describe hacking tools and malware mostly designed to target specific electronic devices, including smartphones, smart TVs, and PCs.

"That makes a big difference," said Herbert Lin, a senior research scholar for Cyber Policy and Security at Stanford University. "It's much more targeted than about bulk collection."

WikiLeaks has claimed the documents underscore how the CIA has created an arsenal of cyberweapons without any public oversight. But others like Lin view the matter differently.

"It’s the CIA's job to spy on foreigners," he said. "If the CIA wasn't developing these tools, then someone ought to have been fired."

Nevertheless, WikiLeaks claims it might have evidence that the agency spied on targets in the U.S. From the stolen documents, it's found 22,000 IP addresses that allegedly correspond to computers systems within the country. However, so far, WikiLeaks has yet to release more details.

Until it does, it's hard to say what any of those addresses might signify, said Alex Heid, chief research officer at Security Scorecard.

"Just because the IP address is being hosted within the USA, doesn't mean an American citizen was making use of it," he said.

Domestic spying?

However, the CIA certainly has a history of domestic spying in the U.S., Heid added. The CIA itself was involved in the illegal surveillance of journalists, antiwar protestors, and suspected communists from the 1950s to the 1970s.

Since then, the CIA has undergone reforms. And the agency has said it's "legally prohibited" from conducting electronic surveillance targeting anyone in the country.

But that doesn't mean the CIA can't find ways to work around those restrictions. The agency can actually request the FBI collect data in the U.S. for it. In fact, it can lend the FBI hand with the surveillance by offering "specialized equipment and technical knowledge," according to a government executive order.

There isn’t much information on how the CIA follows these rules in practice, said Nate Cardozo, a staff attorney with privacy advocate the Electronic Frontier Foundation. But he wonders if these leaked CIA hacking tools were also in the hands of other federal U.S. agencies, such as the FBI and Department of Homeland Security, which can investigate U.S. citizens.

Given that WikiLeaks obtained a copy, it's also unclear if any foreign government or malicious hackers might have this hacking tech as well.

"The CIA developed these powerful tools and lost control of them," Cardozo said. "So who knows who else has control over these tools? That's the most frightening thing to me."

Latest Videos

​Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.​

No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?

Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.